SECURITY
PROTOCOLS and SERVICES
    A. Key Management 
    1. General 
    - Question 112. How Does One Find Random Numbers for Keys? 
 
    - Question 113. What is the Life Cycle of a Key? 
 
    2. Public-Key Issues 
    - Question 114. What Key Management Issues are Involved in
        Public-Key Cryptography? 
 
    - Question 115. Who Needs a Key Pair? 
 
    - Question 116. How Does One Get a Key Pair? 
 
    - Question 117. Should a Public Key or Private Key be
        Shared Among Users? 
 
    - Question 118. What Happens When a Key Expires? 
 
    - Question 119. What Happens if I Lose my Private Key? 
 
    - Question 120. What Happens if my Private Key is
        Compromised? 
 
    - Question 121. How Should I Store my Private Key? 
 
    - Question 122. How Do I Find Someone Else's Public Key? 
 
    3. Certificates 
    - Question 123. What are Certificates? 
 
    - Question 124. How are Certificates Used? 
 
    - Question 125. Who Issues Certificates and How? 
 
    - Question 126. How Do Certifying Authorities Store their
        Private Keys? 
 
    - Question 127. How Are Certifying Authorities Susceptible
        to Attack? 
 
    - Question 128. What if a Certifying Authority's Key is
        Lost or Compromised? 
 
    - Question 129. What are Certificate Revocation Lists
        (CRLs)? 
 
    B. Security on the Internet 
    1. Secure Electronic Mail 
    - Question 130. What is PEM? 
 
    - Question 131. What is S/MIME? 
 
    - Question 132. What is PEM-MIME, or What is MOSS? 
 
    2. General Security Protocols 
    - Question 133. What is S-HTTP? 
 
    - Question 134. What is SSL? 
 
    - Question 135. What is the Difference Between SSL and
        S-HTTP? 
 
    - Question 136. What is PCT? 
 
    - Question 137. What is S/WAN? 
 
    3. Electronic Commerce 
    - Question 138. What is Electronic Money? 
 
    - Question 139. What is iKP? 
 
    - Question 140. What is SEPP? 
 
    - Question 141. What is Secure Courier? 
 
    - Question 142. What is STT? 
 
    4. Authentication Systems 
    - Question 143. What are Identification Schemes and
        Authentication Protocols? 
 
    - Question 144. What is Kerberos? 
 
C. Cryptography APIs 
Question 145. What are CAPIs?